Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll
Resource
win10v2004-20220901-en
General
-
Target
7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll
-
Size
802KB
-
MD5
3a249853728b45b7f9167700bde334bd
-
SHA1
80cc1d21344f8e0403f6d86c45d7d95b925e5a5c
-
SHA256
7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8
-
SHA512
e6e5203969e3abd08564e705c3ab6140ab85e5eade2d5d57c9f668eb87524e3c05b4ddb115a7746d38ab1976cc702e3f71ef36c9f5a13c4b095b30cbfcceb6fa
-
SSDEEP
24576:7i5+B+GT31CLJqlDBnprOT8oz57JEMyY8rWTDwHgcXNl:Uq+GDoJi3gyMSuK1
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Wine rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Temp = "rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll,nbkmehswxygrqbasrqrix" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1252 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1252 rundll32.exe 1252 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1252 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27 PID 1760 wrote to memory of 1252 1760 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d70dfefe3d06d699893f3dea83769448177a210b575b5f5331c209f89b541d8.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1252
-